summaryrefslogtreecommitdiffstats
path: root/data/CVE/2014.list
diff options
context:
space:
mode:
authorBrian May <brian@linuxpenguins.xyz>2020-04-01 07:17:16 +1100
committerBrian May <brian@linuxpenguins.xyz>2020-04-01 07:34:56 +1100
commit10c8c53f890a29bcb892bc2cdbd3d25f0c69e754 (patch)
treeb1df71355f39183a155d2d41dd892c428b0b9fb9 /data/CVE/2014.list
parent3b1daa193bc95ff45777ce16eba78bb2c11e8b2d (diff)
lua-cgi - code is broken and cannot be exploited
As per bug #954300, the session.close function is broken. This means it is not possible to save session data. This in turn means it there are no concerns if the session id is made public because there is no sensitive data associated with the session. So it doesn't matter if somebody attempts to guess the session id because it doesn't reveal anything useful. This bug is trivial to resolve, however the fact that nobody is complaining about this bug or trying to fix the bug would strongly suggest that nobody is using session management with lua-cgi.
Diffstat (limited to 'data/CVE/2014.list')
-rw-r--r--data/CVE/2014.list4
1 files changed, 3 insertions, 1 deletions
diff --git a/data/CVE/2014.list b/data/CVE/2014.list
index 9526615b5c..957d49fd15 100644
--- a/data/CVE/2014.list
+++ b/data/CVE/2014.list
@@ -19574,8 +19574,10 @@ CVE-2014-2877
CVE-2014-2876
RESERVED
CVE-2014-2875 (The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses wea ...)
- - lua-cgi <unfixed> (bug #953037)
+ - lua-cgi <not-affected> (code is broken and cannot be exploited)
NOTE: https://github.com/keplerproject/cgilua/issues/17
+ NOTE: https://bugs.debian.org/953037
+ NOTE: https://bugs.debian.org/954300
CVE-2014-XXXX [Insecure default permissions for ~/.virtualenvs and scripts]
- virtualenvwrapper 4.3-1 (low; bug #745580)
[wheezy] - virtualenvwrapper <no-dsa> (Minor issue)

© 2014-2024 Faster IT GmbH | imprint | privacy policy